Search alternatives:
"use security" » "used security" (Expand Search)
Showing 1 - 20 results of 34 for search '"use security"', query time: 0.12s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Identification of the Employee's Mental Patterns about the Policies of Information Security by ryhaneh zahra esfandiarpour, morteza Akbari

    Published 2016-07-01
    “…Although most organizations use security technologies, they concluded that technology is not enough by itself and the key threat to the organization security comes from employees who do not agree with the organization security policies. …”
    Get full text
    Article
  5. 5

    Evaluating the Impact of Artificial Intelligence Tools on Enhancing Student Academic Performance: Efficacy Amidst Security and Privacy Concerns by Jwern Tick Kiet Phua, Han-Foon Neo, Chuan-Chin Teo

    Published 2025-05-01
    “…This research investigates the perceptions and attitudes of students towards the use of AI tools in their academic activities, focusing on constructs such as perceived usefulness, the perceived ease of use, security and privacy concerns, and both positive and negative attitudes towards AI. …”
    Get full text
    Article
  6. 6

    FEATURES OF USING FRAMEWORKS AND UX DESIGN APPROACHES FOR DEVELOPING ELECTRONIC INSURANCE PLATFORMS by О. Katerniak

    Published 2024-09-01
    “…The right choice of frameworks and UX design approaches can significantly impact the quality of the final product, particularly its ease of use, security, and overall efficiency. Understanding these aspects allows developers to create more adaptable and successful solutions that meet user needs. …”
    Get full text
    Article
  7. 7

    Problems of implementing SIEM systems in the practice of managing information security of economic entities by V. A. Sizov, A. D. Kirov

    Published 2020-03-01
    “…The aim of the study is to increase the efficiency of information security management of economic entities that use Security Information and Event Management (SIEM) systems by identifying and solving the main problems of introducing these systems into the management of information security practices of economic entities [1-3].Materials and research methods. …”
    Get full text
    Article
  8. 8
  9. 9

    Adoption of digital payment systems in e-marketing: The moderating role of consumer trust in Jordan by Ali Mohammad Ali Alqudah, Mohammad Mahmoud Saleem Alzubi, Yousef Ahmad ALarabiat, Mohammad Issa Al Zoubi, Omar Mohammad Ali Alqudah

    Published 2025-07-01
    “…The study examines four essential variables: perceived ease of use, perceived usefulness, security and privacy, and awareness under the influence of consumer trust as a mediator. …”
    Get full text
    Article
  10. 10

    Security considerations for smartphone devices by Almina Mušinbegović, Harun Alijagic, Amer Hrnjic, Ali Abd Almisreb

    Published 2024-12-01
    “…Last layer of the protection investigated was in-app information being leaked and otherwise used. Security objectives and mechanisms were also visited in the paper. …”
    Get full text
    Article
  11. 11

    A novel chaotic system with one absolute term: stability, ultimate boundedness, and image encryption by Ali A. Shukur, Ammar Ali Neamah, Viet-Thanh Pham, Giuseppe Grassi

    Published 2025-01-01
    “…The system is combined with the 4×4 Toeplitz matrix to generate an encryption algorithm, validated using security and performance analysis. Combining the proposed system and the Toeplitz matrix improves the pixel distribution's randomness, significantly increasing security. …”
    Get full text
    Article
  12. 12

    Secure Coding in Five Steps by Mini Zeng, Feng Zhu

    Published 2021-07-01
    “…Our evaluation shows that the approach reduces complexity and encourages students to use secure coding practice in their future projects.…”
    Get full text
    Article
  13. 13

    Foregrounding and exclusion strategies in Rouhani's election discourse (case study: 2017 presidential election) by mohamad ali hosainizadah, rasool zareazadeh

    Published 2021-08-01
    “…Consequently, in order to neutralize opponent's propaganda, Rouhani used security signifier in his discourse.…”
    Get full text
    Article
  14. 14

    Context-Aware Intelligent Traffic Light Control through Secure Messaging by Mükremin Özkul, Ilir Capuni, Elton Domnori

    Published 2018-01-01
    “…In this paper, we propose STCM, a context-aware secure traffic control model to manage competing traffic flows at a given intersection by using secure messages with real-time traffic information. …”
    Get full text
    Article
  15. 15

    A DLP Module Design Based on Plug-in for MS Word by Hussein Al-sanabani, Murat İskefiyeli

    Published 2020-08-01
    “…In order to solve this problem, it is important to introduce a DLP-Plugins model where the data owners can identify the privacy of the files during their entire lifecycle (creating, editing, etc.) by classifying them. This model uses security measures such as data encryption and access control to prevent accidental leakage of the classified files by the insiders. …”
    Get full text
    Article
  16. 16

    Developing real-time IoT-based public safety alert and emergency response systems by Han Zhang, Runze Zhang, Jiamanzhen Sun

    Published 2025-08-01
    “…Communication is facilitated using secure MQTT over TLS, with fallback to LoRa for rural or low-connectivity environments. …”
    Get full text
    Article
  17. 17

    Comparison of Mobile Transaction Security Using NFC and QR Codes by Lucia Nugraheni Harnaningrum, Kristoforus Nanda Mahardhian

    Published 2024-11-01
    “…These two payments have their characteristics. NFC payments use secure elements that encrypt credential data to ensure safe transactions. …”
    Get full text
    Article
  18. 18

    Mechanisms for Securing Autonomous Shipping Services and Machine Learning Algorithms for Misbehaviour Detection by Marwan Haruna, Kaleb Gebremichael Gebremeskel, Martina Troscia, Alexandr Tardo, Paolo Pagano

    Published 2024-10-01
    “…On one side, our solution is intended to secure communication channels between the SCCs and the vessels using Secure Exchange and COMmunication (SECOM) standard; on the other side, it aims to secure the underlying digital infrastructure in charge of data collection, storage and processing by relying on a set of machine learning (ML) algorithms for anomaly and intrusion detection. …”
    Get full text
    Article
  19. 19

    From Traditional Marketplace to Online Shop: Shifting Shopping Patterns among University Students in Bangladesh by Md. Habibullah Balaly, Md. Rabiul Islam, Niaz Makhdum, A.M.M. Mubassher Shah, Hasanul Banna

    Published 2025-06-01
    “…Besides, it is essential to instill customer trust in e-commerce platforms by using secure payment systems and trustworthy products and delivery services.…”
    Get full text
    Article
  20. 20

    Blockchain-enabled federated learning with edge analytics for secure and efficient electronic health records management by Munusamy S, Jothi K R

    Published 2025-07-01
    “…The architecture comprises three layers: (1) an Edge Nodes Layer for on-device learning; (2) a Federated Aggregation Layer using Secure Multi-Party Computation (SMPC) and Differential Privacy (DP); and (3) a Blockchain Layer with a lightweight PoS + BFT consensus mechanism. …”
    Get full text
    Article